VOLUME 3, ISSUE 12, DECEMBER 2014


Arabic information retrieval system using the neural network model

ISSAM AL-HADID, SUHA AFANEH, HASSAN AL-TARAWNEH, HIBA AL-MALAHMEH

Abstract | PDF with Text


Comparison of cosine similarity and k-NN for automated essays scoring

DR. AHMED ABD EL-GHANY EWEES, DR. MOHAMED MOHAMED EISA, PROF. DR. MOHAMED MOHAMED REFAAT ELBASIONY

Abstract | PDF with Text


Survey the stochastic computing and probabilistic transfer matrix (PTM) in logic circuits

BAHRAM DEHGHAN, NASER PARHIZGAR

Abstract | PDF with Text


Secure data communication using image encryption and compression

Y.M.KAMBLE, K.B.MANWADE

Abstract | PDF with Text


Reliability estimation of object oriented design a systematic review

ANIL KUMAR, NAMRATA DHANDA

Abstract | PDF with Text


A survey on spam detection techniques

ANJALI SHARMA, MANISHA, DR.MANISHA, DR.REKHA JAIN

Abstract | PDF with Text


Refinement of search results using cross lingual reference technique

MONIKA SHARMA, SUDHA MORWAL

Abstract | PDF with Text


Low power wallace and dadda multiplier based on CLRCL full adder

R.NAVEEN, K.THANUSHKODI, C.SARANYA

Abstract | PDF with Text


A single natural image denoising based on independent component analysis

MR.VIPULPATIL, DR. A.J. PATIL

Abstract | PDF with Text


Automated attendance system using markov random field algorithm

ABHILASH MARADWAR, NIKITA SURYAWANSHI, TUSHAR PANPALIYA, SURAJ SONGIRE

Abstract | PDF with Text


Swarm-based intelligent technique to prevent selective jamming attacks for dynamic topology

S.SURYA, D.SWATHIGAVAISHNAVE, T.KANIMOZHI

Abstract | PDF with Text


Feature extraction of ECG signals for early detection of heart arrhythmia

K.AKILANDESWARI, R.SATHY

Abstract | PDF with Text


An investigation of approaches for image forgery detection

MANDEEPKAUR, DR.SAVITA GUPTA

Abstract | PDF with Text


Ant colony trust based secure detection in wireless sensor networks

M.S VIJI, MR.R.SHANKAR

Abstract | PDF with Text


A Survey on various routing protocols in mobile ad hoc networks

SOMASUNDARAM R, SUMITHRA K, BHARATHI S

Abstract | PDF with Text


A Novel routing protocol based on multipath routing for mobile adhoc networks

V.SRAVANI, K.C.K.NAIK, DR.CH.BALASWAMY

Abstract | PDF with Text


Intrusion detection system using decision tree-based attribute weighted AODE

VASUDHA K. DESHPANDE

Abstract | PDF with Text


A Novel way of image encrption with piplining pixel scrambling and fractional fourier transform

SUNITA KUMARI, PRATAP SINGH PATWAL

Abstract | PDF with Text


Subcarrier and power allocation in OFDM based cognitive radio networks A Survey

VIDHYA.B, RAMYAH.S.B, REVATHI.G

Abstract | PDF with Text


Achieving low latency networks through high performance computing

CHANDRIKA PRASAD, VEENA G.S, CHIRAG AGRAWAL, ROBIN SRIVASTAVA

Abstract | PDF with Text


A model to ensure data integrity in the cloud

TAWFIQ S. BARHOOM, ZAKARIA KH. SAQALLAH

Abstract | PDF with Text


Human thought controlled electrical switching using fast Fourier transform

PROF. GANESH S.DESHMUK, BHUSHAN P.RATHOD, TEJAS S.ZAGADE , NITIN D.PARKHE, PARESH L.WAGHMARE

Abstract | PDF with Text


Preventing the falsified data injection attack through multiple relay network

M.PRIYANKA, G.PREMAPRIYA

Abstract | PDF with Text


Implementation and analysis of real time obstacle avoiding subsumption controlled robot

VINAY S.DASMANE, MRYUTUNJAY R.MADKI

Abstract | PDF with Text


A study of multi-oriented text recognition in natural scene images

MONA SAUDAGAR, S.V.JAIN

Abstract | PDF with Text


A machine learning framework of neural network combined with PLS regression and artificial immune system for intrusion detection

G.V.PRADEEP KUMAR, D.KRISHNA REDDY

Abstract | PDF with Text


Delay sensitive analysis on wireless sensors network A Survey

S.THAMIZHARASAN, T.RAJAN BABU, S.SARAVANAN, V. PRASANNA VENKATESAN

Abstract | PDF with Text


Comprehensive study of non touch enable password system

MONICA VARIA, HARDIK MODI

Abstract | PDF with Text


Watermark insertion and detection using contourlet and wavelet transforms

SHUBHRA BANERJI, DR. AVIJIT KAR

Abstract | PDF with Text


A new modified RC6 algorithm for cryptographic applications

P.SRITHA, R.ASHOKKUMAR, S, BHUVANESWARI, M.VIDHYA

Abstract | PDF with Text


Comparative study and analyzes the power factor variation due to loading effect

JYOTI LALOTRA, ABHINAV SHARMA

Abstract | PDF with Text


A review on implementation of data scrambler & descrambler system using VHDL

NAINA K.RANDIVE, PROFESSOR G.P.BORKHADE

Abstract | PDF with Text


Recognizing user activities in smart environments with automatically constructed fuzzy finite automata

H.KARAMATH ALI, DR. D.I.GEORGE AMALARETHINAM

Abstract | PDF with Text


A technical review on comparison of XEN and KVM hypervisors an analysis of virtualization technologies

MS JAYSHRI DAMODAR PAGARE, DR. NITIN A KOLI

Abstract | PDF with Text


An approach to video steganography using novel substitution technique

AKASH AGRAWAL, D.A.BORIKAR

Abstract | PDF with Text


Feasibility Study for Cloud Computing in Education Field Sudanese Research and Education Network (SudREN)

SHAKER KHAIRALLH SALEH, ASHRAF GASIM ELSID ABDALLA

Abstract | PDF with Text


A strong and efficient privacy and security guarantee using CACHET

ADDANKI NAGESHWAR RAO, B.KAMESWARA RAO

Abstract | PDF with Text


Implementation of reversible vedic multiplier for low latency and reduced resources utilization applications

K.SRINIVASA RAO, G.SANKARA RAO

Abstract | PDF with Text


Novel power –up sequence control for MTCMOS designs

BANGURU NAGARJUNA, T.PRASHANTH

Abstract | PDF with Text


Implementation of embedded shock and vibration monitoring system for underwater vehicles

P.RAGHAVA KUMARI, S.P.K.CHAITANYA, M.NIRMALA

Abstract | PDF with Text


Performance evaluation of adaptive bit interleaved coded modulation in OFDM with various fading channels

SIRUVURI UMA SANKAR RAJU, K.SURESH

Abstract | PDF with Text


Content based image retrival using invariant color and texture features

K.CHAITANYA SRUTHI, SHAIK.PEER AHAMED

Abstract | PDF with Text


Intelligent fire sensing using wireless sensor network

PRADEEP KUMAR, M.S.ANURADHA

Abstract | PDF with Text


An open source approach for continuous speech recognition using hidden Markov models

GURUSIDDAPPA HUGAR, VISHWANATH HIREGOUDAR

Abstract | PDF with Text


Random Scan Algorithm for Image Steganography in Scilab for Security Purposes

ISHANT PREMI, MRS. SUKHJINDER KAUR

Abstract | PDF with Text


Filtering intrusion detection alarms Using Ant Clustering approach

SALAH GHODHBANI, FARAH JEMILI

Abstract | PDF with Text


An efficient protocol for secure communication in Wireless Ad Hoc Networks

S.MOTHIVENKATA MANOJ, DR. S.VASUNDRA

Abstract | PDF with Text


A novel approach to the hierarchical co-clustering in text mining with zone contents and metadata

RUCHA BHUTADA, D.A.BORIKAR

Abstract | PDF with Text


Optimization Design of Query Processing Performance Using Appropriate Materialized View Selection & Preservation

S D CHOUDHARI

Abstract | PDF with Text


Design of a Micro Strip Patch Antenna to Minimize Return Loss for Wi-MAX Application

A.S.M. BAKIBILLAH, MD. SAKHAWATH HOSSAIN, IVY SAHA ROY

Abstract | PDF with Text


Optimization of clustering process in heterogeneous wireless sensor network

SANJEEV KUMAR GUPTA, POONAM SINHA

Abstract | PDF with Text


Desert Nomads Healthcare Monitoring Application Based on BSN and Wi-Max 

EL AHMADI CHEIKH, SAAD CHAKKOR, MOSTAFA BAGHOURI, ABDERRAHMANE HAJRAOUI

Abstract | PDF with Text

Open chat
Chat with IJARCCE